CN103516713A - Facilitating and authenticating transactions - Google Patents

Facilitating and authenticating transactions Download PDF

Info

Publication number
CN103516713A
CN103516713A CN201310246532.9A CN201310246532A CN103516713A CN 103516713 A CN103516713 A CN 103516713A CN 201310246532 A CN201310246532 A CN 201310246532A CN 103516713 A CN103516713 A CN 103516713A
Authority
CN
China
Prior art keywords
data
authentication
message
store device
authenticate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310246532.9A
Other languages
Chinese (zh)
Inventor
N.科赖基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Group PLC
Original Assignee
Vodafone Group PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodafone Group PLC filed Critical Vodafone Group PLC
Publication of CN103516713A publication Critical patent/CN103516713A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3229Use of the SIM of a M-device as secure element
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A computer, such as a Windows-based PC 23, has associated with it a Subscriber Identity Module SIM (15), such as of the type used in a GSM or UMTS cellular or mobile telecommunications network. The SIM 15 can be authenticated with the network 3 in the same way as for authenticating SIMs of mobile telephone handsets used in the network, and can in this way authenticate the user of the PC 23 or the PC 23 itself. Such authentication can, for example, permit use of the PC 23 in relation to a particular application running on the PC 23. Challenge and response messages are transmitted between the network 3 and the SIM 15 via an authenticator module 30 implemented on the PC 23. These authentication messages have the predetermined format of an Over The Air (OTA) message, which is also used in GSM or UMTS telecommunications networks to transmit non-authentication messages - for example, SMS messages. The authentication data is encapsulated within OTA messages. The OTA messages are not necessarily transmitted wirelessly (that is, over the air). They may be transmitted via a fixed network; however, they have the predetermined format of OTA messages.

Description

Help to realize and authenticating transactions
Technical field
The help that the present invention relates to affairs realizes (facilitation) and authentication.Below by the embodiments of the invention that are only described in more detail by example, help to realize and verify data treatment facility (such as personal computer) or its user and (may be long-range) third party between affairs, and such help realization and authenticating may also relate to by user, undertaken or representative of consumer to third-party payment or transfer of data.
Summary of the invention
According to an aspect of the present invention, provide a kind of method of certification entity, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information; Via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity; It is characterized in that described data in thering is communication network described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each.
In said method, described message format is corresponding to aerial (OTA) message format that transmits.
In said method, described authentication store device (15) comprises smart card.
In said method, described authentication store device (15) comprises Subscriber Identity Module or SIM.
In said method, described authentication store device (15) comprises for utilizing GSM or UMTS(3G) mobile telecom network authenticates the data of described entity.
In said method, the authentication information being stored on authentication store device (15) can be used for utilizing mobile telecom network authentication mobile phone handheld device.
In said method, described authenticate device (15) is relevant to GSM or UMTS mobile telecom network.
In said method, described communication network comprises GSM or UMTS mobile telecom network.
In said method, described communication network comprises internet.
In said method, described authentication store device (15) is coupled to carrier (32).
Said method comprises authentication store device (15) is coupled to data processing equipment (23), so that the affairs that authentication is used this data processing equipment (23) to carry out.
In said method, message is transmitted via described data processing equipment (23).
Said method comprises via carrier (32) described authentication store device (15) is coupled to described data processing equipment (23).
In said method, described message is transferred to described authentication store device (15) via described carrier (32).
In said method, described message comprises for reminding described carrier to obtain the element of identity data.
In said method, described identity data comprises PIN or biological attribute data.
In said method, described identity data is transferred to described authenticate device.
In said method, described message comprises for by these message and the differentiation element separating for transmitting the message area of non-verify data.
In said method, described differentiation element is explained by described authentication store device (15).
In said method, described authentication store device (15) and described authenticate device (50) are equipped with corresponding encryption and decryption mechanism.
Said method is included in sets up a kind of in described mechanism and according to the data in message described in this encryption mechanism between described authentication store device (15) and authenticate device (50).
In said method, via basic input/output (BIOS) certified transmission data between this data processing equipment (23) and described authentication store device (15) of described data processing equipment (23).
In said method, described data processing equipment (23) and described mobile telecom network (3) radio communication.
In said method, described data processing equipment (23) comprises mobile communications data card.
Said method comprises from described data processing equipment (23) to authentication store device (15) transfer of security data, use authentication store device (15) to check the validity of this secure data, and only have definite secure data effectively just to exchange selected data with data processing equipment (23).
Said method comprise do not consider the existence of described secure data or validity and with data processing equipment (23) exchange tentation data.
In said method, described message comprises from the inquiry of described authenticate device (50) with from the corresponding answer of authentication store device (15).
According to a further aspect in the invention, provide a kind of equipment for certification entity, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information; Authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) authenticate device (50) is coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity; It is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9) for transmitting non-verify data.
In the said equipment, described message format is corresponding to aerial (OTA) message format that transmits.
The said equipment comprises for carrying out the device of preceding method.
According to a further aspect in the invention, a kind of authentication store device (15) for certification entity is provided, on this authentication store device, store authentication information, this authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity; It is characterized in that for have communication network (3) described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9) for transmitting non-verify data.
In above-mentioned authentication store device, described message format is corresponding to aerial (OTA) message format that transmits.
In above-mentioned authentication store device, described authentication store device (15) comprises smart card.
In above-mentioned authentication store device, described authentication store device (15) comprises subscriber identification module or SIM.
In above-mentioned authentication store device, described authentication store device (15) comprises for utilizing GMS or UMTS(3G) mobile telecom network authenticates the data of described entity.
In above-mentioned authentication store device, the authentication information being stored on authentication store device (15) can be used for utilizing described mobile telecom network (3) authentication mobile phone (1) handheld device.
Above-mentioned authentication store device comprises for carrying out the device of preceding method.
According to a further aspect in the invention, provide a kind of method of certification entity, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information; Via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity; It is characterized in that described data in thering is communication network described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, and wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide a kind of equipment for certification entity, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information; Authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) authenticate device (50) is coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity; It is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9), for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, a kind of authentication store device (15) for certification entity is provided, on this authentication store device, store authentication information, this authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity; It is characterized in that for have communication network (3) described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9), for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide the method for a kind of certification entity with the affairs of execution and service provider (40), the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information; Described authentication store device (15) is coupled to data processing equipment (23) to authenticate this affairs, and these affairs are used described data processing equipment (23) to carry out; Described service provider (40) generates service context (Sc) and this service context is sent to described data processing equipment (23), and described service context (Sc) can be analyzed to determine the authentication that needs described affairs by described data processing equipment (23); Via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity, described authenticate device (50) generates security token (Sx) when authentication occurs, and this security token is sent to described data processing equipment (23); Described data processing equipment (23) passes to described service provider (40) by described security token; It is characterized in that described data in thering is communication network described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, wherein said message is transmitted via described data processing equipment (23), and wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the equipment with the business of service provider (40), this equipment comprises authentication store device (15), on this authentication store device, stores authentication information, data processing equipment (23), for being coupled to described authentication store device (15) to authenticate described business, described business is used described data processing equipment (23) to carry out, described service provider (40) can be used to and generates service context (Sc) and this service context is sent to described data processing equipment (23) to determine the authentication that needs described business, authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) authenticate device (50) is coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity, described authenticate device (50) can be used to when authentication occurs and generates security token (Sx) and this security token is sent to described data processing equipment (23), described data processing equipment (23) can be used to by described security token (Sx) pass to described service provider (40) it is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, wherein this message is transmitted via described data processing equipment (23), wherein this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the authentication store device (15) with the business of service provider (40), on this authentication store device, store authentication information, this authentication store device (15) can be connected to data processing equipment (23) to authenticate described business, and described business is used described data processing equipment (23) to carry out; Described service provider (40) can be used to and generates service context (Sc) and this service context is sent to described data processing equipment (23), described service context (Sc) can analyze to determine the authentication that needs described business by described data processing equipment (23), and this authentication store device is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity; Described authenticate device (50) can be used to when authentication occurs and generates security token (Sx) and this security token is sent to described data processing equipment (23); Described data processing equipment (23) can be used to described security token (Sx) is passed to described service provider (40); And it is characterized in that for have communication network (3) described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit the device of described data, wherein this message is transmitted via described data processing equipment (23), wherein this message format can also be by element described in each (5,7,9), for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide a kind of method of certification entity, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information, via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity, it is characterized in that described data element (5 described in each in thering is communication network, 7, 9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, wherein said message comprises from the inquiry of described authenticate device (50) and the corresponding answer to described authenticate device (50) from described authentication store device (15), described answer is analyzed by described authenticate device (50) to determine that whether described answer is as expected from described authentication store device (15), and wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide a kind of equipment for certification entity, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information, authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) authenticate device (50) is coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity, it is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message comprises from the inquiry of described authenticate device (50) and the corresponding answer to described authenticate device (50) from described authentication store device (15), described answer is analyzed by described authenticate device (50) to determine that whether described answer is as expected from described authentication store device (15), and wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, a kind of authentication store device (15) for certification entity is provided, on this authentication store device, store authentication information, this authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity, it is characterized in that for thering is communication network (3) element (5 described in each, 7, 9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message comprises from the inquiry of described authenticate device (50) and the corresponding answer to described authenticate device (50) from described authentication store device (15), described answer is analyzed by described authenticate device (50) to determine that whether described answer is as expected from described authentication store device (15), and wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message.
According to a further aspect in the invention, provide a kind of method of certification entity, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information; Via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity; It is characterized in that described data in thering is communication network described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, and wherein said message comprises for by those message and the differentiation element separating for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of equipment for certification entity, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information; Authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) authenticate device (50) is coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity; It is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9) for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, and wherein said message comprises for by those message and the differentiation element separating for transmitting the message area of non-verify data.
According to a further aspect in the invention, a kind of authentication store device (15) for certification entity is provided, on this authentication store device, store authentication information, this authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity; It is characterized in that for have communication network (3) described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9) for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, and wherein said message comprises for by those message and the differentiation element separating for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of certification entity to carry out the method for business, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information; Described authentication store device (15) is coupled to data processing equipment (23) to authenticate described business, and described business is used described data processing equipment (23) to carry out; Via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity; It is characterized in that described data in thering is communication network described in each element (5,7,9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, wherein said message is transmitted via described data processing equipment (23), wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, and wherein said message comprises for by those message and the differentiation element separating for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the equipment of business, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information, data processing equipment (23), for being coupled to described authentication store device (15) to authenticate described business, described business is used described data processing equipment (23) to carry out, authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) be coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity, it is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message is transmitted via described data processing equipment (23), wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, and wherein said message comprises for by those message and the differentiation element separating for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the authentication store device (15) of business, on this authentication store device, store authentication information, described authentication store device (15) can be coupled to data processing equipment (23) to authenticate described business, described business is used described data processing equipment (23) to carry out, and described authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7, 9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity, it is characterized in that for thering is communication network (3) element (5 described in each, 7, 9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message is transmitted via described data processing equipment (23), wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, and wherein said message comprises for by those message and the differentiation element separating for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of certification entity to carry out the method for business, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information, described authentication store device (15) is coupled to data processing equipment (23) to authenticate described business, and described business is used described data processing equipment (23) to carry out, via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity, it is characterized in that described data element (5 described in each in thering is communication network, 7, 9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, wherein said message is transmitted via described data processing equipment (23), wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, wherein said authentication store device (15) and described authenticate device (50) are provided with a plurality of counterpart keys set, and wherein said message comprises for by those message and the differentiation element and the indication with the selected cipher key sets of a plurality of cipher key sets of communicating by letter of described authentication store device (15) for encrypt/decrypt that separate for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the equipment of business, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information, data processing equipment (23), for being coupled to described authentication store device (15) to authenticate described business, described business is used described data processing equipment (23) to carry out, authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) be coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity, it is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message is transmitted via described data processing equipment (23), wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, wherein said authentication store device (15) and described authenticate device (50) are provided with a plurality of counterpart keys set, and wherein said message comprises for by those message and the differentiation element and the indication with the selected cipher key sets of a plurality of cipher key sets of communicating by letter of described authentication store device (15) for encrypt/decrypt that separate for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the authentication store device (15) of business, on this authentication store device, store authentication information, described authentication store device (15) can be coupled to data processing equipment (23) to authenticate described business, described business is used described data processing equipment (23) to carry out, and described authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7, 9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity, it is characterized in that for thering is communication network (3) element (5 described in each, 7, 9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message is transmitted via described data processing equipment (23), wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, wherein said authentication store device (15) and described authenticate device (50) are provided with a plurality of counterpart keys set, and wherein said message comprises for by those message and the differentiation element and the indication with the selected cipher key sets of a plurality of cipher key sets of communicating by letter of described authentication store device (15) for encrypt/decrypt that separate for transmitting the message area of non-verify data.
According to a further aspect in the invention, provide a kind of certification entity to carry out the method for business, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information, described authentication store device (15) is coupled to data processing equipment (23) to authenticate described business, and described business is used described data processing equipment (23) to carry out, via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity, it is characterized in that described data element (5 described in each in thering is communication network, 7, 9) can identify and the message of the message format that can transmit in transmit, this message format can also be used for transmitting non-verify data by element described in each, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, wherein said authentication store device (15) and described authenticate device (50) are provided with a plurality of counterpart keys set, and wherein said message comprises for by those message and the differentiation element and the indication with the selected cipher key sets of a plurality of cipher key sets of communicating by letter of described authentication store device (15) for encrypt/decrypt that separate for transmitting the message area of non-verify data, and wherein said message transmits via described data processing equipment (23) but described data processing equipment can not be accessed the content of described message, because described message utilizes selected cipher key sets to encrypt.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the equipment of business, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information, data processing equipment (23), for being coupled to described authentication store device (15) to authenticate described business, described business is used described data processing equipment (23) to carry out, authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) be coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity, it is characterized in that for have communication network (3) described in each element can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5, 7, 9) for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, wherein said authentication store device (15) and described authenticate device (50) are provided with a plurality of counterpart keys set, and wherein said message comprises for by those message and the differentiation element and the indication with the selected cipher key sets of a plurality of cipher key sets of communicating by letter of described authentication store device (15) for encrypt/decrypt that separate for transmitting the message area of non-verify data, and wherein said message transmits via described data processing equipment (23) but described data processing equipment can not be accessed the content of described message, because described message utilizes selected cipher key sets to encrypt.
According to a further aspect in the invention, provide a kind of for certification entity to carry out the authentication store device (15) of business, on this authentication store device, store authentication information, described authentication store device (15) can be coupled to data processing equipment (23) to authenticate described business, described business is used described data processing equipment (23) to carry out, and described authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7, 9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity, it is characterized in that for thering is communication network (3) element (5 described in each, 7,9) can identify and the message of the message format that can transmit in transmit the device of described data, this message format can also be by element described in each (5,7,9) for transmitting non-verify data, wherein said message format is corresponding to aerial transmission (OTA) message format that is suitable for transmitting SMS text message, wherein said authentication store device (15) and described authenticate device (50) are provided with a plurality of counterpart keys set, and wherein said message comprises for by those message and the differentiation element and the indication with the selected cipher key sets of a plurality of cipher key sets of communicating by letter of described authentication store device (15) for encrypt/decrypt that separate for transmitting the message area of non-verify data, and wherein said message transmits via described data processing equipment (23) but described data processing equipment can not be accessed the content of described message, because described message utilizes selected cipher key sets to encrypt.
Accompanying drawing explanation
With reference to the accompanying drawings, only with the form of example, describe according to of the present invention for helping to realize and authentication relates to method, equipment and the authentication store device such as the affairs of the embodiment data processing equipment of the present invention of personal computer.
Fig. 1 shows the primary element of communication network;
Fig. 2 is for explaining the block diagram of the operation of the method relevant to data processing equipment;
Fig. 3 is the perspective view of a kind of configuration of Doyle chip (dongle); And
Fig. 4 is for understanding the flow chart of the foundation of the communication channel between SIM and Virtual network operator;
Fig. 5 A and 5B are for understanding the flow chart of the verification process of being carried out by the data processing equipment of Fig. 2.
Similar element carrys out mark with identical reference number conventionally in the accompanying drawings.
Embodiment
When relating to the affairs requirement authentication of usage data treatment facility, there are many examples.For example, may require data processing equipment to carry out affairs, for example, with third party's (such as, long-range third party) exchange message, must communicate with this long-range third party by telecommunication link (comprise and pass through internet).This third party can require this data processing equipment, or user now, certifiedly before affairs occur meets this third party.
As mentioned above, affairs can only relate to information exchange.For example, for from third party's Download Info, may only need the user of verify data treatment facility.Such information can be the information (information that for example, relates to user's bank account) that the user of third party's representative data treatment facility preserves.Can be instead, this information can be the information of preserving on other data processing equipments, for example, belongs to that user connects or employs user's tissue or the data network of commercial entity, thereby facilitated user to access this network in user's travelling.Another possible affairs may relate to data processing equipment and download software from remote location.
In addition, affairs may require user to pay cost, so that these affairs can carry out, for example, for the information of returning third party and providing pays cost to third party.Obviously, when relating to such payment, it is very important authenticating that this user meets third party and pay with safety, simple and reliable mode.
Although data processing equipment " user " is mentioned in above-mentioned discussion, but in fact at least some above-mentioned affairs can not relate to any human user: can require data processing equipment (for example automatically to move, with role's intermittent duty of information or supervision, and report the result to third party).In this case, alternatively or additionally, perhaps data processing equipment is necessary to authenticate self to meet third party.
Data processing equipment is equipped with the device (authentication store device) for storing predetermined authentication information, or associated with such device, and this predetermined authentication information is for authenticating the specific user of this equipment or this equipment.In one embodiment, device for storing predetermined information is movably, therefore and can pick up and be inserted in any data processing equipment (or computer) that is suitable for receiving it by user, to make, for user, will can authenticate user by the affairs that this computer is carried out.Advantageously, in this case, for the device of storing predetermined information, comprise smart card.
In more specific example, smart card is at mobile or cellular telecommunication network, such as mobile especially group of GSM() or the UMTS/3G(third generation) use in handheld device in network and for authenticating such subscriber identification module or the SIM of the use of this handheld device.Although use term " SIM " here, but should be appreciated that this SIM can be the IP-based IP multimedia subsystem, IMS-IMS of 3G USIM, ISIM(), SIM or general 1C card (UICC, the smart card platform being defined by ETSI SCP, SIM, USIM, ISIM can reside on this platform).
Fig. 1 shows UMTS(3G) mobile or cellular network.Mobile terminal 1 is to UMTS(3G) mobile telecom network 3 registrations.Mobile terminal 1 can be hand phone, be equipped with laptop computer or the PDA(Personal Digital Assistant) of data card.Mobile terminal 1 is by the Radio Access Network (RAN) and mobile telecom network 3 radio communications of mobile telecom network 3, and mobile telecom network 3 comprises (in the situation that of UMTS network) base station (Node B) 5 and radio network controller (RNC) 7.Communication between mobile terminal 1 and mobile telecom network 3 is carried out route by Serving GPRS Support Node (SGSN) 9 from Radio Access Network, and Serving GPRS Support Node can be by fixing (cable) link connection to mobile telecom network 3.
In traditional mode, a plurality of other mobile terminals are to mobile telecom network 3 registrations.These mobile terminals comprise mobile terminal 11 and 13.Terminal 11 is communicated by letter with mobile telecom network 3 in the mode similar with terminal 1 with 13, via suitable Node B 5, RNC7 and SGSN9.
Mobile telecom network 3 comprises Gateway GPRS Support Node (GGSN) 17, and Gateway GPRS Support Node makes it possible to carry out IP-based communication via suitable link 21 with other network such as internet 19.A plurality of terminals are connected to (by fixing or wireless link) internet, PC terminal 23 and PDA terminal 25 are shown as an example.
Each in mobile terminal 1,11 and 13 is equipped with SIM15 separately.In the manufacture process of each SIM, authentication storage information thereon under mobile telecom network 3 is controlled.The own details (comprising authentication information) that is stored in each SIM issuing under its control in SIM management function 50 of mobile telecom network 3.According to described embodiment, this authentication information comprises a plurality of cipher key sets, and cipher key sets can communicating by letter for encrypt/decrypt and SIM.
Normally in service at mobile telecom network 3, terminal 1,11 and 13 (for example authenticates by sending inquiry by network to the terminal 1,11 that contains SIM15 and 13, when user be call out or the object of call accepted and in network in activated terminals), SIM15 calculates and answers (depend on the upper predetermined information of preserving of SIM-normally identifying algorithm and unique key K i) and it is sent it back to mobile telecom network 3 in response to this inquiry.The SIM management function 50 of mobile telecom network 3 produces inquiry and it receives the answer of self terminal 1,11 and 13.Use the information of the pre-stored content about relevant SIM15, authentication function 50 calculates the desired value of the answer of self terminal 1,11 and 13.If the answer receiving is answered and mated with the expection of calculating, think that SIM15 and relevant mobile terminal (and user) pass through authentication.
Should understand under the control of mobile telecom network 3, can be to being equipped with any terminal of SIM15 to carry out such verification process.When described terminal is mobile phone handheld device, this terminal is carried out radio communication via Radio Access Network and the mobile telecom network 3 of network, although this not necessarily.For example, this terminal can be via fixed telephone network (PSTN), via UMA " access point " and/or via internet and described network service.PC23 and PDA25 also can be provided in the SIM15 under the control of described network, although and these SIM also allow authentication-be not must be by the RAN certified transmission data via network 3.
The form of carrying out the message that authentication sends depends on the type (for example SIM, USIM, ISIM, UICC) of used SIM and the type that authenticates and changing.Routinely, each assembly of the telecommunication system shown in Fig. 1 is configured to process the authentication message with a specific form in these forms.If SIM type change, this requires each in telecommunication system components to modify.Described embodiment has overcome this problem by transmit authentication message in having (transmitting) the OTA packet of reference format in the air or sealing (envelope), for example, described in ETSI and 3GPP standard TS23.048 " Security Mechanisms for the (U) SIM Application Toolkit-Stage2 ", the document is hereby incorporated by.If with this operating such, described telecommunication system, assembly can transmit described OTA packet or seal, and no matter the form of this OTA grouping or the content sealed.In fact, authentication message needs not be the conventional form for SIM, but can have different-format.
Terminal 1,11,13,23 and 25 SIM15 that use can be the SIM of defined type in GSM or UMTS standard criterion, or can be the simulation of SIM, that is to say, carry out itself can be embedded in another equipment with SIM() software or the hardware of the corresponding function of function.This SIM can be according to the configuration described in WO-A-2004036513.
It should be noted that described verification process is not the personal identification of necessary authenticated user.For example, cellular telecommunication network has prepayment subscriber, thereby this prepayment subscriber can call out because pre-post-pay paystation is sent to SIM on network.But this prepayment subscriber's identity network is not known (maybe needn't know).Yet until authenticated this user's of network SIM that is to say, such user is the specific user with the specific account of advances of this network, this user could use network.For authenticated user, such pre-pay subscriber or subscriber's SIM can be used comparably (in above-mentioned mode) or be associated with data processing equipment or computer in data processing equipment or computer.
The environment consider changing may wish to change SIM(or simulation SIM) on authentication information.For example, described SIM can be that this particular cellular telecommunications network is the network may be used on the country of usage data treatment facility or computer to the SIM of particular cellular telecommunications network registration.But, may there is wishing or must re-registering to different cellular telecommunication networks the situation (for example, moving to different countries) of SIM described equipment or computer physics.The method that can so do is in our common unsettled GB Patent Application No. 0118406.8,0122712.3 and 0130790.9 and our corresponding PCT application number GB02/003265, open in GB02/003260 and GB02/003252.As here in greater detail, SIM(and thereby simulation SIM) each authentication (and the other) information that relates to a plurality of networks can be equipped with at first, the information of heterogeneous networks can activate selectively relatively.
But user needs not to be the subscriber of communication network.Alternately, they can be the subscribers to some other central authoritiesization system registry, and this central authorities' system then can be to carry out verification process with mode identical in communication network.In this case, SIM(or simulation SIM) registration can from such central authorities' system, be sent to another in the same manner as described above.
As mentioned above, by the embodiment describing, the target of verification process is to help to realize the affairs between data processing equipment or computer and third party.In the situation that verification process is to be carried out by communication network or some other systems (this SIM user is the subscriber of these some other systems), satisfactorily the completing subsequently by this network or notifications third party, so that affairs can be proceeded of verification process.
For many affairs of described type, may relate to user to third-party payment cost.As above is the configuration of other centralization system execution verification process of its subscriber therein by communication network or user, advantageously help to have realized such payment and when payment is small amount payment (being often such situation) advantageous particularly (for example, as the payment that receives the repayment of information, such as weather or transport information, or the payment of carrying out for Interim use specific software); In this case, payment can be charged to the subscriber's that communication network or other centralization system hold account, certainly may after deduction disposal cost, be sent to third party subsequently.
The block diagram of Fig. 2 has schematically shown a kind of mode of operation said method.
Such as based on Windows(RTM) PC23 client platform comprise authenticator module 30, this authenticator module 30 forms a part for the client-end subsystem of the command history of supporting SIM application toolkit and so on, this command history provide for communicate by letter with miscellaneous equipment with the irrelevant agreement of carrier.SIM application toolkit is at ETSI and 3GPP standard TS11.11, and TS31, describes in 111, TS11.14 and TS102.223 to some extent, and described standard is not subject to copyright restrictions and is hereby incorporated by.The order of after this authenticator module 30 being supported is called " SIMTALK " order.Authenticator module 30 comprises SIMTALK interpreter, and it creates SIMTALK packet.The transmission of standardized safe OTA mechanism is used in these packets, below will be described in more detail this OTA mechanism.Provide the SIM equipment 32 wherein with SIM15, and the communication between SIM equipment 32 and authenticator module 30 can be wired or wireless connection via connecting 36() carry out.SIM equipment 32 can receive the order with treatment S IMTALK.SIM equipment 32 is mapped to card application toolkit (CAT) by the SIMTALK packet of reception, so as by SIMTALK command transfer to SIM15.CAT order is that this standard is not subject to copyright restrictions, is incorporated herein by reference as protocol command defined in ETSI SCP CAT standard TS102.223 and that carrier is irrelevant.SIM15 also can create SIMTALK packet; Use CAT that these packets are sent to SIM equipment 34.
Client application 38 is provided on PC10, and this application program allows user to obtain service from remote service operator 40.Should be understood that described " long-range " is not to be intended to hint must have specific geographic distance between PC23 and service provider 40.But common service provider 40 is independent of PC23 to be controlled, although this not necessarily.
In this embodiment, mobile telecom network 3 provides identity provider service 46, payment provider service 48 and SIM management service 50 via gateway 44.Gateway 44 can receive SIMTALK order and produce SIMTALK order.Should be understood that network 3 can be the network of any type, the present invention is not limited to mobile telecom network.For example, gateway 44 can provide in the computer that is linked to PC23 by local area network (LAN), wide area network and/or internet.
SIM equipment 32 can comprise " Doyle chip ", and Doyle chip allows to carry out wired or wireless communication with PC23.Preferably, at SIM(or smart card) and PC23 between communication be safe.This communication can be encrypted, or can adopt any other measure for secure communication.
Doyle chip 32 can be held SIM15, or can be in conjunction with the software of simulation SIM15.Doyle chip 32 allows the data to/from automatic network 32 that transmits between Doyle chip 32 and PC23 and go forth for authenticating transactions (or for other suitable object).Suitable connector in Doyle chip 32, is equipped with, to allow data electron exchange between SIM15 and Doyle chip 32.Doyle chip 32 also comprises suitable connector 36, for allowing the connection of the data communication object of PC23.For example, this connector can be USB connector, Fireware1394 connector, smart media (RTM) connector ,Jin territory connector (for example, using NFCIP-1 agreement), bluetooth (RTM) connector, infrared connector or any other suitable connector.
Various buttons 56 are installed on the shell 52 of the Doyle chip 32 shown in Fig. 3, and wherein ten show from 0 to 9 respective digital above button.In this embodiment, Doyle chip 32 comprises for receiving the device (such as software) of the input of PIN number from user by operating the button 56 of suitable appointment.Shell 52 can also provide display 58 alternatively, for reminding user, inputs their PIN number and/or shows if necessary PIN number and the out of Memory of inputting.
Should be understood that the possibility as button 56, can provide other device to allow PIN input.Alternatively, can be by obtaining some other security information from user and comparing authorized user to use SIM15 with the data of SIM15 storage this information.For example, the data that obtain can be user's fingerprints, or at another person's unlikely some further features that repeat with it, for example, any suitable biological attribute data.It is upper that the details of fingerprint (or out of Memory) can be stored in SIM, or by network 3ID supplier 46(or elsewhere) storage, to compare with the input data of representation feature.
In superincumbent description, point out for the SIM of authenticating transactions, to there is the form of the conventional SIM being equipped with in Doyle chip 32.This can be simply mobile network's the SIM that subscriber calls out in their conventional mobile phone handheld device and receipt of call is used.Alternatively, SIM15 is directly installed to movably PC23 or is embedded in (SIM can not be removed or can not be removed completely easily like this) among PC23.Further alternatively, SIM can not have independently physical form, but can simulate by software and/or hardware in PC23 or Doyle chip 32.SIM can simulate or merge in the chipset of PC23.For example, SIM can merge or simulate in the central processor unit of PC23.Such configuration prevent SIM(or simulation SIM) from PC23, remove (and except by performance PC23 useless).
If SIM is the form that can not remove from PC23 or Doyle chip 32 easily, the subscriber of telecommunication system can be equipped with in the mobile phone handheld device that the 2nd SIM is for example used in them.
But, for example, if (in PC23 or Doyle chip 32) carrys out authenticating transactions and in a usual manner for communication network (with identical SIM, use mobile phone handheld device to call out and receipt of call), can provide the authentication to affairs by the identical data of the data of using when utilizing mobile telephone network authentication SIM when calling out.Alternatively, SIM can have for carrying out the separate records of every kind of auth type.Can have and be included in the data used in authenticating transactions and/or the first record of algorithm, and for utilize the second separate records of communication network authentication terminal with normal mode.The first and second records can have authenticate key separately, for the unique identifier of communication network and/or unique identifying algorithm.Do not need to utilize network 3 these mobile phone handheld devices of authentication to be PC23 authenticating transactions for SIM.
Doyle chip 32 also can be carried out for PC(or other computing equipment) the function of routine data card.Therefore Doyle chip will comprise for carrying out the device of radio communication with network 3.Utilize this configuration, Doyle chip will have suitable size and except having the Doyle chip of above-mentioned functions, using comprising, allow it as the suitable connector of data card operation.
As PC23 together with the SIM15 with its coupling by initial power-up time, or when SIM15 by coupling (via SIM equipment 32) for the first time to opened PC23 time, the initialization procedure of execution as shown in the flow chart of Fig. 4.
The identity provider 46 that authenticator module 30 belongs to from the data of this SIM of SIM15 request mark and it and the expression of gateway 44 (that is to say, under the control of SIM management function 50, issue this SIM15, SIM management function 50 is associated with identity provider and gateway)-step a.These requests of 30 pairs of data from SIM15 of authenticator module are sent to SIM equipment 32 from authenticator module 30.SIM equipment 32 is transmitted to SIM15-step b by described request.SIM15 returns to its identity data, gateway 44 address and its identity provider 46 address-step c.SIM equipment 32 by this data retransmission to authenticator module 30-steps d.
Authenticator module 30 subsequently contact service gateway 44 with from its request initialization data-step e.Authenticator module 30 can be equipped with " overall situation " key, for example, offers the key of all authenticator module 30 of issuing under the control of network 3.Such key in force can obfuscation.In addition, if jeopardize secret key safety, new key more.Authenticator module 30 provide described global secret to gateway 44 to confirm the integrality of authenticator module 30.This initialisation data request sends identity provider 46 to by gateway 44.Identity provider checks SIM identity data, gateway 44 address and identity provider 46 address, and if determine that this information is correct, identity provider 46 is that gateway 44 produces initialization data, and this initialization data makes gateway 44 can be established to OTA communication path (via authenticator module 30 and SIM the equipment 32)-step f of SIM15.As mentioned above, authentication information YouID supplier 46 storages of each SIM.ID supplier 46 selects suitable cipher key sets (using the cipher key sets data that obtain from SIM management function 50) to encrypt the content of the OTA packet sending by described communication path.The header of each OTA packet comprises the indication (for example, SMS text message, authentication message etc.) of the type of OTA packet and the indication (but not being key itself) of selected cipher key sets.This header data is received by SIM15.If specified data grouping is authentication message, extract SIMTALK order and identification cipher key sets designator.The counterpart keys set that access provides in manufacture process in this SIM, and with this counterpart keys set, decipher the message receiving from gateway in the communication session of nowadays setting up.Alternatively, can send new cipher key sets and in SIM management function 50, store corresponding cipher key sets to SIM, to can use new cipher key sets encrypting messages.
OTA packet is that this standard is not subject to copyright restrictions, is hereby incorporated by by the defined reference format of ETSI3GPP standard TS23.048.OTA packet is irrelevant with carrier.This OTA packet is not to transmit by OTA.They can transmit or by comprising fixing (wired) Internet Transmission of internet by OTA.
Flow chart referring now to Fig. 5 A and 5B.
When subscriber wants to use the service (steps A of the flow chart shown in Fig. 5 A) being provided by remote service operator 40, subscriber is by being inserted into their Doyle chip that comprises SIM15 32 the suitable link slot of PC23 or using wireless link that their SIM15 is coupled to PC23(step B).Subscriber activates client application relevant on this PC23 32 subsequently to obtain required service (step C).For example, client application 32 can be to provide or be arranged on the special software on subscriber's PC23 by service provider 40 under it is controlled.Alternatively, client application 32 can be the web browser for the suitable website of access services operator 40.
For the operation of the system shown in key diagram 2, will provide an example, wherein subscriber wants to buy a specific CD from vendor, and this seller is service provider 40.The graphic user interface that use presents on PC23, the web browser software providing on PC23 is provided subscriber, and via the 40 of the Internet access services operator website.This web browser software forms client application 32, and allows the website that access is relevant to the service provider 40 of selling CD.
Data communication between client application 32 and service provider 40 can for example, by fixed network (PSTN) or be undertaken by wireless network, this wireless network such as network 3 or another mobile telecom network.
Subscriber inputs the desired details of service provider 40 (such as their name and address)-step D subsequently.
Subscriber searches for described website and wants with identification subscriber the CD buying.When identifying the required CD of this subscriber, subscriber makes client application 32 send service request information (step e) to service provider 40, for example, clicks the button of " purchase CD " that Gai website provides by mouse.Described message comprise identify required CD data, sign subscriber data (such as subscriber's SIM identifier), this sign subscriber's data comprise that expression subscriber has installed the field of authenticator module 30 on their PC, and this authenticator module 30 can authenticating transactions by subscriber's SIM15.
In this stage of affairs, some details of subscriber being provided to service provider 40, comprises that subscriber's name, address and they want the CD ordering.This information can be by not being that someone of subscriber provides.For authenticating transactions, service provider 40 has built service context Sc(step F).Service context is the packet that comprises following field:
The identifier of zero service provider 40
Zero subscriber's name (or other identifier, such as SIM identifier)
The details of zero affairs that will authenticate (being to buy CD in this example)
Currently also can provide other or optional information.
Service context Sc sends to client application 32 via internet.Client application 32 sends service context Sc to authenticator module 30(step G).Client application 32 can add its identifier to service context Sc, so that network 3 can be determined these affairs, comes from which client application.
Authentication module 30 Analysis Service contexts, and determine and need to ask by 3 pairs of these transaction authentications of network.Authentication module 30 detects the subscriber's who whether has the SIM15 that comprises subscriber Doyle chip 32(step H).If there is no Doyle chip 32, and reminding user makes their Doyle chip use.Authentication module 30 can also show the explanation of the affairs that will authenticate, and provides option to approve these affairs or do not approve these affairs to subscriber.Suppose and have Doyle chip, and subscriber approved this affairs, authentication module 30 sends the request of security token Sx (step I) with the rear gateway 44 to network 3.This request that sends to gateway 44 comprises service context Sc.These data can be passed through any suitable Internet Transmission.For example, these data can be via internet transmissions.These data can be transmitted by fixed telephone network, or by communication network 3 transmission of mobile or honeycomb.
Subscriber will be authenticated by gateway 44 after this, and gateway 44 is carried out inquiry and response session (by sending data via the authenticator module 30)-step J with SIM.Gateway 44 will send random enquire to authenticator module 30, and this inquiry is transferred to SIM15.This inquiry sends as OTA packet, and this OTA packet is encrypted by selected cipher key sets in the above described manner.SIM is used the counterpart keys set of the upper storage of SIM to decipher this OTA packet.Then extract the inquiry of deciphering.SIM15 is by with identifying algorithm with reside in this SIM15 and unique key K i of distributing to this certain subscriber encrypts described random enquire and responds.Use selected cipher key sets encrypt this response and this response is encapsulated in OTA packet, this OTA packet has the header that shows used cipher key sets (and the character of this OTA packet and destination).This OTA packet is transferred to gateway 44 via authenticator module 30.The cipher key sets data that gateway 44 use obtain from SIM management function 50 via ID supplier 46 are deciphered OTA packet.Then the SIM of this deciphering response is sent to ID supplier 46.ID supplier 46 analyzes this response, to determine whether this response is the response of the SIM15 from that subscriber of expection.If described response is the response of expection, gateway 44 sends security token Sx, and this service token is sent to authenticator module 30(step K).Authenticator module 30 oneself do not need to understand the data that exchange in inquiry and response process-it as these data pipeline-in fact, it can not decipher described OTA packet because cipher key sets is unknown to it.
As additional safety measure, the OTA challenge data packet that gateway 44 produces can comprise that requirement subscriber provides the SIMTALK order of some secure datas (such as PIN or biological attribute data).This SIMTALK order is extracted and is carried out by SIM.SIM sends order to point out user use button 56 their PIN(of input or biological attribute data is provided with rear to SIM equipment 32).This PIN(or biological attribute data) be encapsulated in the response OTA packet of encryption, and compare with the biological attribute data that pre-stored PIN or subscriber had previously offered ID supplier 46.
SIM15 comprises the private data such as identifying algorithm and unique key K i.These data are not obtained very important by unverified side.When combining with mobile phone handheld device with general fashion, SIM makes for calling out or when call accepted, the private data on SIM is not vulnerable, because serving as reasons according to the mobile phone handheld device access SIM of strict international standard operation.The mobile phone handheld device of only deferring to these standards is allowed to use together with mobile telecom network with SIM.But as designed in the present embodiment, when SIM and PC23 coupling, the private data on SIM can be accessed by any application program of any application program on PC23 or access PC23 potentially.When therefore, the private data on SIM15 is used in a usual manner than SIM in mobile phone handheld device, more easily suffer unverified access.
According to a feature of the present invention, SIM15 is configured to only allow PC23 to carry out limited access to the data on this SIM.Can have several different SIM security mechanisms, it can be selected by user or network 3.
In pattern 1, the application program on PC23 can only read identification data, such as SIM ID, the SIM person of sending ID, HeID supplier 46 address, gateway 44 address.PC23 can not obtain any other data from SIM15, thereby has protected the private data of the upper storage of SIM15.
In pattern 2, the communication between SIM15 and PC23 is encrypted.The only application program that is allowed to access the PC23 of SIM15 is authenticator module 30.The software of realizing authenticator module 30 comprises public-private cipher key pair.These keys can be arranged on PC23 before PC23 is distributed to subscriber together with authenticator module software.Alternatively, authenticator module 30 softwares and key can be distributed to subscriber on the recordable media such as CD-ROM, to be arranged on PC23.When PC23 is by initial power-up, or when using Doyle chip 34 that SIM15 is newly connected to PC23, SIM15 sends the SIMTALK order of its public keys of request and certificate to authenticator module.On SIM15, there is the pre-stored root certificate relevant to authenticator module 30 on it, and can check the certificate of authenticator module 30 effective.SIM15 determines that the certificate of authenticator module 30 is effective, and SIM15 produces session key, and this session key is sent to authenticator module 30.Authenticator module 30 is used communicating by letter of this secret key encryption and SIM15 subsequently.Know that this session key makes SIM15 can decipher these communications.Therefore any communication that SIM15 can suppose this session key of use is from believable authenticator module (because this authenticator module has effective certificate).Advantageously, network 3 provides the renewal of valid certificate every now and then to SIM15.If network 3 is known authenticator module 30 and threatened in some way safety, will abolish the certificate of this authenticator module, and to the SIM15 of sending.When authenticator module 30 sends to SIM15(for example its public keys and certificate, when PC23 powers up), SIM15 will detect this certificate and abolish, and not send session key, and under this safe mode, the communication between authenticator module 30 and SIM15 is impossible like this.
Described safe mode 3 above in detail, its permission is set up OTA communication channel between SIM15 and gateway 44.But, such OTA communication channel be merely able to for when GSM/3G inquiry and response process have been successfully completed to SIM15 transmission SIMTALK order.That is to say, the communication in this safe mode will only may be carried out between gateway 44 and SIM15.Although OTA packet is via authenticator module 30 transmission, authenticator module 30 can not be accessed the content of this packet, because they are to use to only have DuiID supplier 46(and SIM management function 50) and the known cipher key sets encryption of SIM15.
Safe mode 4 is similar to safe mode 2; But, do not exist for any other pattern mutual require in advance process.Safe mode 4 is generally used for delivery network access voucher, such as WLAN.For WLAN authentication, this option always requires any encrypting and authenticating on WLAN termination SIM to process, and EAP client should reside on SIM especially together with PC application program.
Other optional safe mode also can be provided.
Refer again to the flow chart of Fig. 5 B, after authentication has successfully finished, if require the payment to these affairs, the details of desired payment is included in service context Sc.This information is extracted from service context Sc by gateway 44.Gateway 44 can send message to payment provider 48 subsequently, and payment provider 48 is in subscriber's reserves funds in the account of network 3.
Security token Sx is transmitted to client application 38(step L).
Client application 38 sends security token to service provider 40(step M subsequently).
Security token Sx comprises the data that are exclusively used in certain subscriber and have the affairs of the details that service provider 40 provides.Many affairs can be by network 3, authenticator module 30 and service provider 40 parallel processings.Owing to being exclusively used in the data of the particular transaction with the details that service supplier 40 provides in security token Sx, these affairs can be distinguished from each other out.
If security token Sx is intercepted when passing through between network 3 and authenticator module 30 or between client application 38 and service provider 40, this security token is not worth interceptor.Security token Sx is exclusively used in, and the particular transaction of details and the providing the service of certain subscriber that service provider 40 provides is provided.
When service provider 40 receives security token Sx, its content is analyzed, and if determine its service context Sc sending corresponding to service provider 40, service provider 40 can be supposed this request (order of CD) of service is made by subscriber is legal.Service provider 40 can offer security token Sx identity provider 46, to detect the validity of this token.Identity provider 46 is checked subsequently the integrality (for example, checking it whether to be sent or sent by another believable identity provider by identity provider 46) of security token Sx and is verified the content of this security token Sx.Identity provider 46 sends and indicates this security token Sx effectively to respond to service provider 40 with rear.Alternatively, gateway 44 can send data to service provider 40, and these data make service provider 40 oneself to determine the completeness and efficiency of this security token Sx.Then can send this CD with charge free.If require to pay, service supplier 22 can produce payment context Pc and use this payment context to utilize network 3 from user's account, to obtain payment in the mode of describing in WO-A-2004036513.Certainly can use other method paying that obtains.
As mentioned above, the communication between PC23 and network 3 is preferably encrypted.For the communication between the assembly in the communication between the assembly in PC23 and network 3, also preferably encrypt, for example, by using shared key.According to an aspect of the present invention, can revise the PC23 described in superincumbent embodiment to comprise complete data card module (that is to say, for the equipment of the Radio Access Network radio communication with communication network 3).For the PC23 of equipment like this can be communicated by letter with mobile telecom network 3, must SIM15 is relevant to described module to help to realize the authentication that utilizes network 3.Advantageously, SIM15 can remove from PC easily.For example, SIM can be inserted in the SIM card holding tank providing on PC movably, or uses Doyle chip to be connected to PC in above-mentioned mode.If via the operating system access data card module of PC23, this will mean that any verify data of transmitting between SIM15 and this module can be by any softward interview on PC.This may mean that verify data becomes known for unverified side.According to this aspect of this embodiment, data card module is configured to (only) via the BIOS(basic input/output of PC23) communicate by letter with SIM15.Therefore can between SIM15 and described module, communicate and via operating system, not send verify data.

Claims (37)

1. a method for certification entity, the method comprises to this entity provides authentication store device (15), on this authentication store device, stores authentication information; Via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) this authentication store device (15) is coupled to authenticate device (50), to utilize authenticate device (50) to authenticate this entity; It is characterized in that described data in thering is communication network described in each element (5,7,9) can identify and the message of the preassigned message format that can transmit in transmit, described message has for transmitting described data to utilize described authenticate device (50) to authenticate the first auth type of this entity, and this message format can also be by element described in each for transmitting non-verify data with the second standard message type.
2. method claimed in claim 1, wherein said message format is corresponding to aerial (OTA) message format that transmits.
3. the method described in claim 1 or 2, wherein said authentication store device (15) comprises smart card.
4. method claimed in claim 3, wherein said authentication store device (15) comprises Subscriber Identity Module or SIM.
5. the method described in claim 3 or 4, wherein said authentication store device (15) comprises for utilizing GSM or UMTS(3G) mobile telecom network authenticates the data of described entity.
6. method claimed in claim 5, the authentication information being wherein stored on authentication store device (15) can be used for utilizing mobile telecom network authentication mobile phone handheld device.
7. the method described in any one in claim 1 to 6, wherein said authenticate device (15) is relevant to GSM or UMTS mobile telecom network.
8. the method described in any one in claim 1 to 7, wherein said communication network comprises GSM or UMTS mobile telecom network.
9. the method described in any one in claim 1 to 8, wherein said communication network comprises internet.
10. the method described in any one in claim 1 to 9, wherein said authentication store device (15) is coupled to carrier (32).
Method in 11. claims 1 to 10 described in any one, comprises authentication store device (15) is coupled to data processing equipment (23), so that the affairs that authentication is used this data processing equipment (23) to carry out.
Method described in 12. claims 11, wherein message is transmitted via described data processing equipment (23).
Method described in 13. claims 10,11 or 12, comprises via carrier (32) described authentication store device (15) is coupled to described data processing equipment (23).
Method in 14. claims 10 to 13 described in any one, wherein said message is transferred to described authentication store device (15) via described carrier (32).
Method in 15. claims 10 to 14 described in any one, wherein said message comprises for reminding described carrier to obtain the element of identity data.
Method described in 16. claims 15, wherein said identity data comprises PIN or biological attribute data.
Method described in 17. claims 15 or 16, wherein said identity data is transferred to described authenticate device.
Method in 18. claims 1 to 17 described in any one, wherein said message comprises for by these message and the differentiation element separating for transmitting the message area of non-verify data.
Method described in 19. claims 18, wherein said differentiation element is explained by described authentication store device (15).
Method in 20. claims 1 to 18 described in any one, wherein said authentication store device (15) and described authenticate device (50) are equipped with corresponding encryption and decryption mechanism.
Method described in 21. claims 20, is included in and between described authentication store device (15) and authenticate device (50), sets up a kind of in described mechanism and according to the data in message described in this encryption mechanism.
Method in 22. claims 11 to 14 described in any one, wherein via basic input/output (BIOS) certified transmission data between this data processing equipment (23) and described authentication store device (15) of described data processing equipment (23).
Method described in 23. claims 22, wherein said data processing equipment (23) and described mobile telecom network (3) radio communication.
Method described in 24. claims 23, wherein said data processing equipment (23) comprises mobile communications data card.
Method described in 25. claims 11, comprise from described data processing equipment (23) to authentication store device (15) transfer of security data, use authentication store device (15) to check the validity of this secure data, and only have definite secure data effectively just to exchange selected data with data processing equipment (23).
Method described in 26. claims 25, comprise do not consider the existence of described secure data or validity and with data processing equipment (23) exchange tentation data.
Method in 27. claims 1 to 26 described in any one, wherein said message comprises from the inquiry of described authenticate device (50) with from the corresponding answer of authentication store device (15).
28. 1 kinds of equipment for certification entity, this equipment comprises authentication store device (15), on this authentication store device, stores authentication information; Authenticate device (50), via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) authenticate device (50) is coupled to this authentication store device (15), to utilize authenticate device (50) to authenticate this entity; It is characterized in that for have communication network (3) described in each element can identify and the message of the preassigned message format that can transmit in transmit the device of described data, described message has for transmitting described data to utilize described authenticate device (50) to authenticate the first auth type of this entity, this message format can also be by element described in each (5,7,9) for transmitting non-verify data with the second standard message type.
Equipment described in 29. claims 28, wherein said message format is corresponding to aerial (OTA) message format that transmits.
Equipment described in 30. claims 28 or 29, comprises for executing claims the device of 1 to 27 method described in any one.
31. 1 kinds of authentication store devices (15) for certification entity, on this authentication store device, store authentication information, this authentication store device (15) is via a plurality of elements (5 for the communication network (3) of swap data between this authentication store device (15) and authenticate device (50), 7,9) can be connected to authenticate device (50), to utilize authenticate device (15) to authenticate this entity; It is characterized in that for have communication network (3) described in each element (5,7,9) can identify and the message of the preassigned message format that can transmit in transmit the device of described data, described message has for transmitting described data to utilize described authenticate device (50) to authenticate the first auth type of this entity, this message format can also be by element described in each (5,7,9) for transmitting non-verify data with the second standard message type.
Authentication store device described in 32. claims 31, wherein said message format is corresponding to aerial (OTA) message format that transmits.
Authentication store device described in 33. claims 31 or 32, wherein said authentication store device (15) comprises smart card.
Authentication store device described in 34. claims 33, wherein said authentication store device (15) comprises subscriber identification module or SIM.
Authentication store device described in 35. claims 33 or 34, wherein said authentication store device (15) comprises for utilizing GMS or UMTS(3G) mobile telecom network authenticates the data of described entity.
Authentication store device described in 36. claims 35, the authentication information being wherein stored on authentication store device (15) can be used for utilizing described mobile telecom network (3) authentication mobile phone (1) handheld device.
Authentication store device in 37. claims 31 to 36 described in any one, comprises for executing claims the device of 1 to 27 method described in any one.
CN201310246532.9A 2005-03-31 2006-02-23 Facilitating and authenticating transactions Pending CN103516713A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB0506570.1 2005-03-31
GBGB0506570.1A GB0506570D0 (en) 2005-03-31 2005-03-31 Facilitating and authenticating transactions
GB0507587.4 2005-04-14
GB0507587A GB2424807B (en) 2005-03-31 2005-04-14 Facilitating and authenticating transactions

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN200680019419.5A Division CN101189616A (en) 2005-03-31 2006-02-23 Facilitating and authenticating transactions

Publications (1)

Publication Number Publication Date
CN103516713A true CN103516713A (en) 2014-01-15

Family

ID=34566781

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201310246532.9A Pending CN103516713A (en) 2005-03-31 2006-02-23 Facilitating and authenticating transactions
CN200680019419.5A Pending CN101189616A (en) 2005-03-31 2006-02-23 Facilitating and authenticating transactions

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN200680019419.5A Pending CN101189616A (en) 2005-03-31 2006-02-23 Facilitating and authenticating transactions

Country Status (5)

Country Link
US (1) US8737964B2 (en)
EP (1) EP2381386A1 (en)
JP (1) JP5154401B2 (en)
CN (2) CN103516713A (en)
GB (2) GB0506570D0 (en)

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1881434A1 (en) * 2006-06-09 2008-01-23 Axalto SA A personal token having enhanced signaling abilities
EP1919156A1 (en) * 2006-11-06 2008-05-07 Axalto SA Optimized EAP-SIM authentication
HU230695B1 (en) * 2007-10-20 2017-09-28 Andrá Vilmos Method of preparing storing and method of storing single user access information into safe storage unit of a communication device
JO2532B1 (en) * 2008-03-09 2010-09-05 أنس محمود السهلي محمود Subscriber Identity Module (SIM) Chip Bank System and Method
US8799171B2 (en) * 2008-04-01 2014-08-05 International Business Machines Corporation Secure online banking transaction apparatus and method
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
CN101727706B (en) * 2008-10-24 2013-06-05 中兴通讯股份有限公司 Electronic payment system and method for updating mobile user numbers corresponding to intelligent cards
EP2182479A1 (en) * 2008-11-03 2010-05-05 Gemalto SA A method for communicating an authorization response cryptogram to an external entity, and a corresponding system
US9497632B2 (en) * 2009-10-01 2016-11-15 T-Mobile Usa, Inc. System and method for pairing a UICC card with a particular mobile communications device
ES2375861B1 (en) * 2010-03-29 2013-01-29 Vodafone España, S.A.U. SYSTEM AND METHOD TO MANAGE AUTOMATIC AUTHENTICATION TO INTERNET OBJECTIVE RESOURCES.
CN102457374A (en) * 2010-10-18 2012-05-16 卓望数码技术(深圳)有限公司 Safety authentication method of mobile terminal and system thereof
US9408066B2 (en) 2010-12-06 2016-08-02 Gemalto Inc. Method for transferring securely the subscription information and user data from a first terminal to a second terminal
EP2461613A1 (en) 2010-12-06 2012-06-06 Gemalto SA Methods and system for handling UICC data
US20140019760A1 (en) * 2010-12-06 2014-01-16 Gemalto Sa Method for personalizing a secure element comprised in a terminal
US9607336B1 (en) 2011-06-16 2017-03-28 Consumerinfo.Com, Inc. Providing credit inquiry alerts
FR2977418B1 (en) * 2011-06-28 2013-06-28 Alcatel Lucent AUTHENTICATION SYSTEM VIA TWO COMMUNICATION DEVICES
US9094774B2 (en) 2012-05-14 2015-07-28 At&T Intellectual Property I, Lp Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US9148785B2 (en) * 2012-05-16 2015-09-29 At&T Intellectual Property I, Lp Apparatus and methods for provisioning devices to utilize services of mobile network operators
US8800015B2 (en) 2012-06-19 2014-08-05 At&T Mobility Ii, Llc Apparatus and methods for selecting services of mobile network operators
US9473929B2 (en) 2012-06-19 2016-10-18 At&T Mobility Ii Llc Apparatus and methods for distributing credentials of mobile network operators
US20130346571A1 (en) * 2012-06-24 2013-12-26 Sergei MAKAVEEV Computer and method of operation of its network
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
WO2015166216A1 (en) 2014-05-02 2015-11-05 Barclays Bank Plc Transaction authentication
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US10417634B1 (en) * 2014-08-29 2019-09-17 Amazon Technologies, Inc. On-line transaction verification service and apparatus
WO2016149207A1 (en) * 2015-03-13 2016-09-22 The North Face Apparel Corp. Energy harvesters, energy storage, and related systems and methods
GB201506045D0 (en) * 2015-04-09 2015-05-27 Vodafone Ip Licensing Ltd SIM security
US20170169420A1 (en) * 2015-12-14 2017-06-15 WIBMO Inc. One-step payments in a secure digital platform
CN106909824A (en) * 2015-12-22 2017-06-30 北京握奇智能科技有限公司 A kind of ciphering and deciphering device and method
US20180248869A1 (en) * 2017-02-28 2018-08-30 Panasonic Intellectual Property Management Co., Ltd. Mobile device theme park or resort experience dongle
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11877218B1 (en) 2021-07-13 2024-01-16 T-Mobile Usa, Inc. Multi-factor authentication using biometric and subscriber data systems and methods

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2449287Y (en) * 2000-09-05 2001-09-19 上海力保科技有限公司 Automatic internet ticket selling machine capable of ordering ticket with mobile telephone set
US20030012159A1 (en) * 2001-07-13 2003-01-16 Dan Vassilovski System and method for mobile station authentication using session initiation protocol (SIP)
WO2004036467A1 (en) * 2002-10-17 2004-04-29 Vodafone Group Plc. Facilitating and authenticating transactions

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3564899B2 (en) 1996-10-25 2004-09-15 凸版印刷株式会社 IC card and IC card system
US20010045451A1 (en) 2000-02-28 2001-11-29 Tan Warren Yung-Hang Method and system for token-based authentication
GB2378098B (en) * 2001-07-27 2005-04-13 Vodafone Plc Telecommunications systems and smart cards use therewith
FI114953B (en) * 2001-09-28 2005-01-31 Nokia Corp The method of identifying the user on the terminal, the identification system, the terminal and the authentication device
US7343490B2 (en) * 2001-11-30 2008-03-11 Nokia Siemens Networks Oy Apparatus, and associated method, for facilitating authentication of a mobile station with a core network
US7149545B2 (en) * 2002-05-30 2006-12-12 Nokia Corporation Method and apparatus for facilitating over-the-air activation of pre-programmed memory devices
US7280847B2 (en) * 2002-07-26 2007-10-09 Way Systems Inc System and method for mobile transactions using the bearer independent protocol
GB2396707B (en) * 2002-10-17 2004-11-24 Vodafone Plc Facilitating and authenticating transactions
GB2394327B (en) * 2002-10-17 2006-08-02 Vodafone Plc Device for facilitating and authenticating transactions
GB2406925B (en) * 2003-10-09 2007-01-03 Vodafone Plc Facilitating and authenticating transactions

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2449287Y (en) * 2000-09-05 2001-09-19 上海力保科技有限公司 Automatic internet ticket selling machine capable of ordering ticket with mobile telephone set
US20030012159A1 (en) * 2001-07-13 2003-01-16 Dan Vassilovski System and method for mobile station authentication using session initiation protocol (SIP)
WO2004036467A1 (en) * 2002-10-17 2004-04-29 Vodafone Group Plc. Facilitating and authenticating transactions

Also Published As

Publication number Publication date
JP5154401B2 (en) 2013-02-27
GB2424807B (en) 2009-12-23
US20090215431A1 (en) 2009-08-27
EP2381386A1 (en) 2011-10-26
JP2009500696A (en) 2009-01-08
US8737964B2 (en) 2014-05-27
GB2424807A (en) 2006-10-04
CN101189616A (en) 2008-05-28
GB0507587D0 (en) 2005-05-18
GB0506570D0 (en) 2005-05-04

Similar Documents

Publication Publication Date Title
CN103516713A (en) Facilitating and authenticating transactions
CN108496382B (en) Secure information transmission system and method for personal identity authentication
Schwiderski-Grosche et al. Secure mobile commerce
RU2411670C2 (en) Method to create and verify authenticity of electronic signature
US8335925B2 (en) Method and arrangement for secure authentication
EP1216538B1 (en) Method and apparatus for executing secure data transfer in a wireless network
CN100583883C (en) Method of providing a signing key for digitally signing, verifying or encrypting data and mobile terminal
JP6704919B2 (en) How to secure your payment token
CN108476223B (en) Method and apparatus for SIM-based authentication of non-SIM devices
CN101164086A (en) Methods, system and mobile device capable of enabling credit card personalization using a wireless network
CN102314576A (en) In NFC equipment, carry out the method for Secure Application
CN101599117B (en) System and method for providing code signing services
US20140052992A1 (en) Response to Queries by Means of the Communication Terminal of a User
KR101206072B1 (en) System and Method for Managing Private Information
EP1715437A2 (en) Controlling data access
WO2006103383A1 (en) Facilitating and authenticating transactions
Dass et al. Security framework for addressing the issues of trust on mobile financial services
Pohlmann et al. SIM-enabled open mobile payment system based on nation-wide PKI
KR20140143130A (en) Secured mobile phone payment system for using personal identification number and method thereof
KR20170023400A (en) Method for Processing Payment based on Application Program by using One Time Password
Rossnagel Mobile Qualified Electronic Signatures
KR20160053867A (en) Method for Processing Payment based on Application Program by using One Time Password
KR20020087656A (en) Method for certifying a right user using a wireless communication apparatus
KR20100136361A (en) System and method for processing mobile phone small sum of money settlement, server and recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140115